Lucene search

K
cve[email protected]CVE-2016-6367
HistoryAug 18, 2016 - 6:59 p.m.

CVE-2016-6367

2016-08-1818:59:01
web.nvd.nist.gov
833
In Wild
4
cisco
asa
software
local users
privileges
cli commands
bug
security vulnerability
cve-2016-6367
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.

Affected configurations

NVD
Node
ciscoadaptive_security_appliance_softwareMatch7.0.1
OR
ciscoadaptive_security_appliance_softwareMatch7.0.1.4
OR
ciscoadaptive_security_appliance_softwareMatch7.0.2
OR
ciscoadaptive_security_appliance_softwareMatch7.0.3
OR
ciscoadaptive_security_appliance_softwareMatch7.0.4
OR
ciscoadaptive_security_appliance_softwareMatch7.0.4.2
OR
ciscoadaptive_security_appliance_softwareMatch7.0.5
OR
ciscoadaptive_security_appliance_softwareMatch7.0.5.12
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.4
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.8
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.18
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.22
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.26
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.29
OR
ciscoadaptive_security_appliance_softwareMatch7.0.6.32
OR
ciscoadaptive_security_appliance_softwareMatch7.0.7
OR
ciscoadaptive_security_appliance_softwareMatch7.0.7.1
OR
ciscoadaptive_security_appliance_softwareMatch7.0.7.4
OR
ciscoadaptive_security_appliance_softwareMatch7.0.7.9
OR
ciscoadaptive_security_appliance_softwareMatch7.0.7.12
OR
ciscoadaptive_security_appliance_softwareMatch7.0.8
OR
ciscoadaptive_security_appliance_softwareMatch7.0.8.2
OR
ciscoadaptive_security_appliance_softwareMatch7.0.8.8
OR
ciscoadaptive_security_appliance_softwareMatch7.0.8.12
OR
ciscoadaptive_security_appliance_softwareMatch7.0.8.13
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.16
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.20
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.24
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.28
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.38
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.42
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.46
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.49
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.53
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.61
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.64
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.72
OR
ciscoadaptive_security_appliance_softwareMatch7.1.2.81
OR
ciscoadaptive_security_appliance_softwareMatch7.2.1
OR
ciscoadaptive_security_appliance_softwareMatch7.2.1.9
OR
ciscoadaptive_security_appliance_softwareMatch7.2.1.13
OR
ciscoadaptive_security_appliance_softwareMatch7.2.1.19
OR
ciscoadaptive_security_appliance_softwareMatch7.2.1.24
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.6
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.10
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.14
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.18
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.19
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.22
OR
ciscoadaptive_security_appliance_softwareMatch7.2.2.34
OR
ciscoadaptive_security_appliance_softwareMatch7.2.3
OR
ciscoadaptive_security_appliance_softwareMatch7.2.3.1
OR
ciscoadaptive_security_appliance_softwareMatch7.2.3.12
OR
ciscoadaptive_security_appliance_softwareMatch7.2.3.16
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.6
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.9
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.18
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.25
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.27
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.30
OR
ciscoadaptive_security_appliance_softwareMatch7.2.4.33
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.2
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.4
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.7
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.8
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.10
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.12
OR
ciscoadaptive_security_appliance_softwareMatch7.2.5.16
OR
ciscoadaptive_security_appliance_softwareMatch8.0.1.2
OR
ciscoadaptive_security_appliance_softwareMatch8.0.2
OR
ciscoadaptive_security_appliance_softwareMatch8.0.2.11
OR
ciscoadaptive_security_appliance_softwareMatch8.0.2.15
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3.6
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3.12
OR
ciscoadaptive_security_appliance_softwareMatch8.0.3.19
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.3
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.9
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.16
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.23
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.25
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.28
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.31
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.32
OR
ciscoadaptive_security_appliance_softwareMatch8.0.4.33
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.20
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.23
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.25
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.27
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.28
OR
ciscoadaptive_security_appliance_softwareMatch8.0.5.31
OR
ciscoadaptive_security_appliance_softwareMatch8.1.0.104
OR
ciscoadaptive_security_appliance_softwareMatch8.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.1.1.6
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.13
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.15
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.16
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.19
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.23
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.24
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.49
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.50
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.55
OR
ciscoadaptive_security_appliance_softwareMatch8.1.2.56
OR
ciscoadaptive_security_appliance_softwareMatch8.2.0.45
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.1.11
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.9
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.10
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.12
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.16
OR
ciscoadaptive_security_appliance_softwareMatch8.2.2.17
OR
ciscoadaptive_security_appliance_softwareMatch8.2.3
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2.4.4
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.13
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.22
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.26
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.33
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.40
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.41
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.46
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.48
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.50
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.52
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.55
OR
ciscoadaptive_security_appliance_softwareMatch8.2.5.57
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.1
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.4
OR
ciscoadaptive_security_appliance_softwareMatch8.3.1.6
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.4
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.13
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.23
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.25
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.31
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.33
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.34
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.37
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.39
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.40
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.41
OR
ciscoadaptive_security_appliance_softwareMatch8.3.2.44

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%